In the vast realm of cyber threats, a relatively newer but impactful method has emerged: Adversary In the Middle (AiTM) attacks. AiTM attacks have recently become more popular as organizations started... more
Cloud automation is a complex collection of software, prone to cascading failures, and exposed to an untrusted population of users. How can it be exploited, what are the consequences, and how can we c... more
I have talked about the issue of data center security in my previous blog posts and described that data centers of global IT cloud providers are built to last and can and will withstand just about any... more
A few days ago a fellow colleague opened a very tipical question of storing data off premise, more precisely, in the cloud of (any) provider. While individuals seem to, virtually blindly, entrust clou... more